POC详情: dfc3a11d88209edc2b59085a01f2baafa18887a0

来源
关联漏洞
标题: GLPI SQL注入漏洞 (CVE-2025-24799)
描述:GLPI是GLPI开源的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI存在SQL注入漏洞,该漏洞源于库存端点SQL注入,可能导致未经授权的操作。
描述
CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
介绍
# CVE-2025-24799 Auto Exploit

![Python](https://img.shields.io/badge/Python-3.11-blue)
![Status](https://img.shields.io/badge/Status-POC-orange)
![Author](https://img.shields.io/badge/Author-Rosemary1337-red)

---

## ⚡ Overview

**CVE-2025-24799** is a proof-of-concept (PoC) exploit targeting **GLPI**.  
This exploit demonstrates **unauthenticated SQL Injection (time-based blind)** to extract user credentials.

> **Disclaimer:** This PoC is for educational purposes only. Do **not** use on systems without permission.

---

## 🛠 Features

- Detects `glpi_users` table and required columns (`name` and `password`)  
- Extracts usernames and passwords sequentially  
- Time-based blind SQL injection for unauthenticated exploitation  
- Colorful console output with status, success, failure, and info messages  
- Works on Python 3.x with minimal dependencies  

---

## ⚙️ Installation

1. Clone the repository:
```bash
git clone https://github.com/Rosemary1337/CVE-2025-24799.git
cd CVE-2025-24799
````

2. Install dependencies:

```bash
pip install -r requirements.txt
```

> Requirements: `requests`, `colorama`, `beautifulsoup4`

---

## 🚀 Usage

```bash
python3 main.py -u <TARGET_URL>
```

### Example:

```bash
python3 main.py -u http://target.com/index.php/ajax
```

### Arguments

| Flag        | Description | Required | Default |
| ----------- | ----------- | -------- | ------- |
| `-u, --url` | Target URL  | Yes      | -       |

---

## 🎨 Output

The console shows:

* Status messages `[•]`
* Success `[✔]`
* Fail `[✖]`
* Info `[i]`

Example:

```
[•] Exploiting CVE-2025-24799...
[✔] Table 'glpi_users' found.
[✔] Required columns verified.
[i] Starting credential extraction...

[+] Credential 1: admin:5f4dcc3b5aa765d61d8327deb882cf99
[+] Credential 2: user:123456
[*] Extraction complete.
```

---

## 🔐 Security & Disclaimer

* For **educational & testing purposes only**.
* Do **not** attack websites without explicit permission.
* Use in a controlled lab or authorized penetration test only.

---

## 🔗 Connect with Me

I'm an active developer who enjoys building tools and sharing knowledge. You can reach me through:
<p align="left"> <a href="https://github.com/Rosemary1337" target="_blank"> <img src="https://img.shields.io/badge/GitHub-181717?style=for-the-badge&logo=github&logoColor=white"/> </a> <a href="https://t.me/stupidp3rson" target="_blank"> <img src="https://img.shields.io/badge/Telegram-26A5E4?style=for-the-badge&logo=telegram&logoColor=white"/> </a> <a href="https://www.tiktok.com/@justan0therloser" target="_blank"> <img src="https://img.shields.io/badge/TikTok-000000?style=for-the-badge&logo=tiktok&logoColor=white"/> </a> <a href="mailto:rayhanmahardika576@gmail.com" target="_blank"> <img src="https://img.shields.io/badge/Email-8A2BE2?style=for-the-badge&logo=minutemailer&logoColor=white"/> </a> </p> 
文件快照

[4.0K] /data/pocs/dfc3a11d88209edc2b59085a01f2baafa18887a0 ├── [1.0K] LICENSE ├── [6.9K] main.bin ├── [ 255] main.py ├── [2.8K] README.md └── [ 33] requirements.txt 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。